Efficiency coefficient calculation for technical information security based on its parameters
DOI:
https://doi.org/10.18372/2225-5036.21.9687Keywords:
coefficient for technical information security, technical information security, given the likelihood of a security breach highs, breaking attempt, time for breaking attempt, complex of technical information securityAbstract
This paper shows ways to determine the efficiency coefficient for technical information security in the design stage and analysis of the functioning of technical security. The complexity of the determination of efficiency coefficient for technical information security is the lack of all necessary initial parameters. Therefore, we considered three main options. First, when we know the financial costs invested in the protection and time of the attempt to hacking attempts. The second option – it is when we know the financial costs of the defense and the possibility of breaking the technical security on the first try, which is known for. The probability of breaking proofing for the initial conditions can be calculated using various other existing methods and methods for assessing the quality of technical information security. The third option – the most common, where known, any two attempts, time of break-in attempts and the likelihood of hacking attempts. As a result of research we obtained formulas that allow for these known parameters to build a surface highs probability of breaking technical information security, which can determine the parameters of a possible burglary technical information security for all processes of breaking.References
Журиленко Б.Е. Математическая модель вероятностной надежности комплекса технической защиты информации / Б.Е. Журиленко // Безпека інформації. – 2012. №2 (18). – С. 61-65.
Журиленко Б.Е. Метод проектирования единичной системы технической защиты инфор-мации с вероятностной надежностью и заданными параметрами взлома / Б.Е. Журиленко // Безпека інформації.– 2014. – №1 (20). – С. 36-42.
Downloads
Published
2015-11-30
Issue
Section
Software & Hardware Architecture Security